By Topic

Analysis and improvement of an access control scheme with user authentication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $33
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
S. -M. Yen ; Dept. of Comput. Sci., Chung-Hua Polytech. Inst., Hsinchu, Taiwan ; C. -S. Laih

Both user authentication and access control are required for data protection in computer systems. Recently, Ham and Lin proposed an access control scheme with integration of user authentication. In their scheme, the above two functions are combined together to prevent possible security threats between these two protection modules. This paper, argues that there are some redundant information and verification operations in their scheme. A more compact and efficient alternative, with the same security and characteristics, is presented. Also, a batch-type multiple-access request verification is suggested to improve the efficiency of the system and a password updating process is proposed to facilitate the dynamic operations

Published in:

IEE Proceedings - Computers and Digital Techniques  (Volume:141 ,  Issue: 5 )